Check the status of CVEs. Learn More.
Keeping your systems up 100% of the time requires live patching. Our solutions will align strongly with your risk, compliance, and operational uptime requirements.
TuxCare is trusted by the most innovative companies across the globe.
Learn about TuxCare's modern approach to reducing cybersecurity risk with Blogs, White Papers, and more.
Continually increasing Cybersecurity, stability, and availability of Linux servers and open source software since 2009.
TuxCare provides live security patching for numerous industries. Learn how TuxCare is minimizing risk for companies around the world.
2x a month. No spam.
September 14, 2022 - TuxCare expert team
Cybersecurity researchers at Trend Micro have identified a 75% leap year-over-year in the number of ransomware attacks targeting Linux users.
Apart from ransomware groups, there is also a 145% increase in Linux-based cryptocurrency-mining malware attacks. In this case, the attackers secretly exploit the power of infected computers and servers to mine for cryptocurrency for themselves.
Hackers are generally motivated to target industries where they know there is a high possibility of making money. Therefore, encrypting Linux systems could be lucrative judging by how fast attacks targeting Linux servers are increasing.
One of the identified strategies used by cyberattacks to compromise Linux systems is by exploiting unpatched vulnerabilities. The report identified one of the flaws known as Dirty Pipe.
Dirty Pipe is tracked as CVE-2022-0847 and it affects the Linux kernel from version 5.8 and up which attackers can use to escalate their privileges and run code.
To protect systems from cyberattacks, researchers recommend that all security patches be applied as soon as possible. This will prevent attackers from taking advantage of publicly available exploits.
It is also important that organizations apply multi-factor authentication across the ecosystem. MFA will provide an additional layer of defense and prevent ransomware hackers from conducting lateral movement across the network.
“New and emerging threat groups continue to evolve their business model, focusing their attacks with even greater precision. That’s why it’s essential that organizations get better at mapping, understanding, and protecting their expanding digital attack surface,” said Jon Clay, VP of threat intelligence for Trend Micro.
The sources for this piece include an article in ZDNet.
Learn About Live Patching with TuxCare
Malicious hackers have started exploiting a critical vulnerability CVE-2022-44877 in...
Deep Instinct researchers reported that RATs like StrRAT and Ratty...
According to CircleCI’s CTO, Rob Zuber, CircleCI is working with...
A remote attacker could exploit multiple vulnerabilities in four Cisco...
In a notable IcedID malware attack, the assailant impacted the...
Bitdefender experts have created a universal decryptor for victims of...